JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2022, Vol. 57 ›› Issue (7): 73-84.doi: 10.6040/j.issn.1671-9352.0.2021.453
LIU Yun, SONG Kai*, CHEN Lu-yao, ZHU Peng-jun
CLC Number:
[1] 邓玉静,王倩悦,尹荣荣,等.考虑级联失效的有向WSNs节点重要度评估模型[J]. 小型微型计算机系统, 2020, 41(1):111-116. DENG Yujing, WANG Qianyue, YIN Rongrong, et al. Evaluation model of node importance considering cascading failures in directed WSNs[J]. Journal of Chinese Computer Systems, 2020, 41(1):111-116. [2] 滕志军,庞宝贺,孙铭阳,等. 基于环境参数优化和时间信誉序列的恶意节点识别模型[J]. 西北工业大学学报, 2020, 38(3):634-642. TENG Zhijun, PANG Baohe, SUN Mingyang, et al. Model for malicious node recognition based on environmental parameter optimization and time reputation sequence[J]. Journal of Northwestern Polytechnical University, 2020, 38(3):634-642. [3] 周文雄,林穗. 无线传感网络恶意节点识别算法[J]. 计算机系统应用, 2020, 29(2):175-180. ZHOU Wenxiong, LIN Sui. Malicious node recognition algorithm in wireless sensor networks[J]. Computer Systems & Applications, 2020,29(2):175-180. [4] 夏伟. 基于传感器的无线网络恶意节点检测研究[J]. 西安文理学院学报(自然科学版), 2020, 23(4):41-46. XIA Wei. Research on sensor-based malicious node detection in wireless networks[J]. Journal of Xi an University(Natural Science Edition), 2020,23(4):41-46. [5] WEI She, LIU Qi, ZHAO Tian, et al. Blockchain trust model for malicious node detection in wireless sensor networks[J]. IEEE Access, 2019, 7:38947-38956. [6] TIAN Y L, WANG Z, XIONG J B, et al. A blockchain-based secure key management scheme with trustworthiness in DWSNs[J]. IEEE Transactions on Industrial Informatics, 2020, 16(9):6193-6202. [7] WU D, ANSARI N. A Trust-evaluation-enhanced blockchain-secured industrial IoT system[J]. IEEE Internet of Things Journal, 2021, 8(7):5510-5517. [8] WANG G, LU S W, YU F, et al. A method to improve the security of information diffusion in complex networks——node trust-value management mechanism[J]. IEEE Access, 2019, 7:138175-138191. [9] 周远林,陶洋,李正阳,等. 基于双簇头的无线传感器网络反馈信任模型[J]. 计算机工程, 2021, 47(3):174-182. ZHOU Yuanlin, TAO Yang, LI Zhengyang, et al. Double cluster head-based feedback trust model for wireless sensor network[J]. Computer Engineering, 2021, 47(3):174-182. [10] YU J Y, LEE E, OH S, et al. A survey on security requirements for WSNs: focusing on the characteristics related to security[J]. IEEE Access, 2020, 8:45304-45324. [11] ADERIBOLE A, ALJARWAN A, UR REHMAN M H, et al. Blockchain technology for smart grids: decentralized NIST conceptual model[J]. IEEE Access, 2020, 8:43177-43190. [12] 于戈,聂铁铮,李晓华,等. 区块链系统中的分布式数据管理技术:挑战与展望[J]. 计算机学报, 2021, 44(1):28-53. YU Ge, NIE Tiezheng, LI Xiaohua, et al. The challenge and prospect of distributed data management techniques in blockchain systems[J]. Chinese Journal of Computers, 2021, 44(1):28-53. [13] KIM T, GOYAT R, RAI M K, et al. A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks[J]. IEEE Access, 2019, 7:184133-184144. [14] LIANG J B, ZHANG M, LEUNG V C M. A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud[J]. IEEE Internet of Things Journal, 2020, 7(6):5481-5490. [15] YAN X Z, LUO Q H, YANG Y P, et al. ITL-MEPOSA: improved trilateration localization with minimum uncertainty propagation and optimized selection of anchor nodes for wireless sensor networks[J]. IEEE Access, 2019,(7):53136-53146. |
[1] | Pei-ming WANG,Xing-shu CHEN,Hai-zhou WANG,Wen-xian WANG. Research on microblog data collection based on multiple hybrid strategy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(5): 28-36, 43. |
[2] | Zhen-peng LIU,Wen-sheng WANG,Yu-peng HE,Jing-wei SUN,Bin ZHANG. A deployment strategy for fault recovery of SDN control nodes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(5): 21-27. |
[3] | Hai-yan KANG,Wan-xiang ZHU. Privacy preservation for location-based services [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(11): 35-50. |
[4] | LI Yan-ping, QI Yan-jiao, ZHANG Kai, WEI Xu-guang. Multi-authority and revocable attribute-based encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 75-84. |
[5] | LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88. |
[6] | ZHANG Guang-zhi, CAI Shao-bin, MA Chun-hua, ZHANG Dong-qiu. Application of maximum distance separable codes in the error correction of the network coding [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 75-82. |
[7] | ZHAO Guang-yuan, QIN Feng-lin, GUO Xiao-dong. Design and implementation of P2P-based network measurement cloud platform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 104-110. |
[8] | HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43. |
[9] | WANG Ya-qi, WANG Jing. Rumor spreading on dynamic complex networks with curious psychological mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 99-104. |
[10] | ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73. |
[11] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[12] | SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81. |
[13] | LIN Li. News event extraction based on kernel dependency graph [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 121-126. |
[14] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[15] | ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120. |
|